Presentation is loading. Please wait.

Presentation is loading. Please wait.

Team G-Force: Jason, Veronica, Doug and Socrates Multiple Device Authentication for the Cloud MSIT 458 11.17.12.

Similar presentations


Presentation on theme: "Team G-Force: Jason, Veronica, Doug and Socrates Multiple Device Authentication for the Cloud MSIT 458 11.17.12."— Presentation transcript:

1 Team G-Force: Jason, Veronica, Doug and Socrates Multiple Device Authentication for the Cloud MSIT 458 11.17.12

2 2Team: G Force Multiple Device Authentication for the Cloud Trudy Work Blackberry Personal IPhone Work Desktop Personal Ipad Personal Dell Laptop circa 2011 with Windows 2010 Work Dell Laptop circa 2009 with Windows 2007

3 11.17.123Team: G Force When we started doing research for our project, we found that this scenario was taking place all over the world

4 11.17.124Team: G Force The Change of Mobile Devices in the Workplace BS (before smartphones)  The promise of productivity improvements quickly spread to the corporate world and employees were systematically armed with cell phones and PCs.  Now employees could be contacted and work from anywhere  Blackberries were the only game in town AS (after smartphones)  Corporations didn’t see the need to upgrade their employees to smartphones  So people brought their personal smartphone to the office  The smartphone was the new rock star  A paradigm shift is taking place BlackBerry 850 was the first BlackBerry device introduced in 1999.

5 Paradigm Shift Takes Place 11.17.125Team: G Force  At first IT turned a blind eye to the use of personal devices in the workplace until the impact of this trend became to great to ignore

6 11.17.126Team: G Force Personal Routers Polluting NU Wireless Network  Northwestern students are coming to campus more tech-savvy than ever before and with more wireless-ready devices.  Students setting up unauthorized personal wireless routers and access points in the Residence Halls are impacting wireless service.  “This is creating conflicts and service challenges for others using the Northwestern Wi-Fi network,” said Wendy Woodward, director of NUIT Technology Support Services.  “We strongly recommend that students access the Northwestern wireless network directly and contact the NUIT Support Center if they have questions or

7 11.17.127Team: G Force  Instead of continuing to ignore the personal devices that employees were bringing into the workplace, a trend has began to emerge called: o BYOD : Bring Your Own Device o BYOT : Bring Your Own Technology  BYOD means that companies allow employees to use their own personal devices in the workplace instead of those issued by their company.  It is estimated that 90% of companies will offer BYOD by 2014 Introduction of BYOD

8 11.17.128Team: G Force The Benefits of BYOD  The biggest benefit of allowing BYOD is employee satisfaction  Exposure to cutting edge technology  No more slow technology refresh and upgrade cycles Here are just a few benefits:

9 11.17.129Team: G Force Problems with BYOD Companies must think and plan before they jump on the BYOD bandwagon  The modification of corporate policy is the first thing to consider out before any changes IT will need to be present! Which devices will be permitted? Will individuals have to take more responsibility for trouble shooting and support Who pays for the device? What about the cloud?  There are many more considerations, some of which will be covered later in the presentation.

10 11.17.1210Team: G Force Cloud Computing is the latest buzz word:  It sounds sexy, new and modern  It promises cost savings in a down economy  It brings its own privacy and security concerns  When considered in conjunction with BYOD there is much to discuss!

11 Current: Old School… User ID Password SSL 11.17.12 Team: G Force

12 11.17.1212Team: G Force Implementation Architecture TAC Client TAC Gateway

13 Gateway Architecture 11.17.1213Team: G Force

14 How does it work? 11.17.1214Team: G Force First Packet Authentication occurs BEFORE connection is established.

15 How do we do it? 11.17.1215Team: G Force

16 11.17.1216Team: G Force A more elegant solution : Authenticate the device before any data is transmitted! Can our product allow us to compete with these companies? Should we?

17 11.17.1217Team: G Force – Acceptable use policy on personal devices is difficult to manage – Compliance mandates must still be followed (PCI, HIPAA, GLBA) if this data is accessed on BYOD Incident detection & breaches – Securing corporate and personal data from malware and malicious apps – Shared device and auto-login * Good Technology State of BYOD Report, Jan 2011 Security Risks

18 11.17.1218Team: G Force Productivity Benefits Benefits  Using BYOD can result in savings of up to $80 / mo / user*  Mobility yields higher productivity benefits Type of WorkerActivityValue ExecutiveCollaboration$1,300 Field SalesCustomer Face Time$700 Knowledge WorkerProductivity$300 * Good Technology State of BYOD Report, Jan 2011

19 11.17.1219Team: G Force Legal Risks Privacy & Liability – Corporate device  Employers have 100% access to data per SCOTUS – Personal device  Employers do not necessarily have access rights to data Medical information Personal pictures Your location Confidentiality + Trade Secrets – Trade secrets are no longer secret on personal devices E-Discovery and electronic evidence Integrity – destruction of personal data via remote command Intellectual Property ownership

20 11.17.1220Team: G Force Business Benefits Operating Expenses – no more data plans on income statement Capital Expenses – no more devices on income statement Fact: This is how people want to work – Who wants to carry personal and work devices? – Recruitment of young talent – Increase of mobile productivity

21 11.17.1221Team: G Force Solution that fits many different business segments “ BlackRidge is thrilled to be working with Sypris Electronics on integrating our TAC technology within the Sypris key management framework,” - Bob Graham, Chairman and CEO of BlackRidge Technology. “We believe the combined solution will give government customers an unparalleled level of protection.” - Bob Graham, Chairman and CEO of BlackRidge Technology.

22 11.17.1222Team: G Force How to manage personal devices in the enterprise… 1.Create Thy Policy Before Procuring Technology 2. Seek The Flocks’ Devices 3. Enrollment Shall Be Simple 4. Thou Shalt Configure Devices Over the Air 5. Thy Users Demand Self-Service 6. Hold Sacred Personal Information 7. Part the Seas of Corporate and Personal Data 8. Manage Thy Data Usage 9. Monitor Thy Flock—Herd Automatically 10. Drink from the Fountain of ROI By Rob Patey, art by Nathan Salla

23 11.17.1223Team: G Force Back – Up Slides Multiple Device Authentication for the Cloud

24 Trend in Mobile Device Ownership 11.17.1224Team: G Force ~235,000,000

25 11.17.1225 Demographics of Smartphone Owners

26 11.17.1226Team: G Force Workplace Reality


Download ppt "Team G-Force: Jason, Veronica, Doug and Socrates Multiple Device Authentication for the Cloud MSIT 458 11.17.12."

Similar presentations


Ads by Google